CVE-2024-3435
8.4HIGHA path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to
Veröffentlicht: 5/16/2024Aktualisiert: 7/9/2025
Beschreibung
A path traversal vulnerability exists in the 'save_settings' endpoint of the parisneo/lollms-webui application, affecting versions up to the latest release before 9.5. The vulnerability arises due to insufficient sanitization of the 'config' parameter in the 'apply_settings' function, allowing an attacker to manipulate the application's configuration by sending specially crafted JSON payloads. This could lead to remote code execution (RCE) by bypassing existing patches designed to mitigate such vulnerabilities.
KI-AnalyseKI-gestützt
Betroffene Produkte
lollmslollms_web_ui
Referenzen
- https://github.com/parisneo/lollms-webui/commit/bb99b59e710d00c4f2598faa5e183fa30fbd3bc2Patch
- https://huntr.com/bounties/494f349a-8650-4d30-a0bd-4742fda44ce5ExploitIssue TrackingPatchThird Party Advisory
- https://github.com/parisneo/lollms-webui/commit/bb99b59e710d00c4f2598faa5e183fa30fbd3bc2Patch
- https://huntr.com/bounties/494f349a-8650-4d30-a0bd-4742fda44ce5ExploitIssue TrackingPatchThird Party Advisory